Search Result Save to File Save as CSV
Your search for 38223 returns 2664 document(s)
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next